1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
|
/* { dg-do compile { target ia64-*-* } } */
/* { dg-options "-O3 -msched-control-spec" } */
typedef long unsigned int size_t;
typedef unsigned char uint8_t;
typedef unsigned int uint32_t;
typedef uint8_t byte;
typedef enum pgpArmor_e
{
PGPARMOR_ERR_CRC_CHECK = -7, PGPARMOR_ERR_BODY_DECODE =
-3, PGPARMOR_ERR_UNKNOWN_ARMOR_TYPE = -2, PGPARMOR_ERR_NO_BEGIN_PGP =
-1, PGPARMOR_NONE = 0, PGPARMOR_MESSAGE = 1, PGPARMOR_PUBKEY =
5, PGPARMOR_PRIVKEY = 6, PGPARMOR_SECKEY = 7
}
pgpArmor;
pgpCRC (const byte * octets, size_t len)
{
unsigned int crc = 0xb704ce;
int i;
while (len--)
{
for (i = 0; i < 8; i++)
{
crc <<= 1;
if (crc & 0x1000000)
crc ^= 0x1864cfb;
}
}
}
pgpReadPkts (const char *fn, const byte ** pkt, size_t * pktlen)
{
const byte *b = ((void *) 0);
const char *enc = ((void *) 0);
byte *dec;
size_t declen;
uint32_t crcpkt, crc;
int pstate = 0;
pgpArmor ec = PGPARMOR_ERR_NO_BEGIN_PGP;
{
switch (pstate)
{
case 0:
if (b64decode (enc, (void **) &dec, &declen) != 0)
{
goto exit;
}
crc = pgpCRC (dec, declen);
}
}
exit:if (ec > PGPARMOR_NONE && pkt)
*pkt = b;
}
|